1. Trang chủ
  2. » Công Nghệ Thông Tin

An ninh trên thiết bị di động

35 461 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 35
Dung lượng 5,64 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Mobile Device SecurityBased on materials from Tom Eston SecureState, Apple, Android Open Source Project, and William Enck NCSU... Android: DroidDream Malware• Infected 58 apps on Androi

Trang 1

Mobile Device Security

Based on materials from Tom Eston (SecureState),

Apple, Android Open Source Project, and William Enck (NCSU)

Trang 2

Quick Overview of Mobile Devices

• iOS/Android Threats and Attacks

• iOS/Android Security

Trang 3

Overview of Mobile Devices

• Many connect to cellular

networks: billing system

• Cisco: 7 billion mobile

devices will have been sold

by 2012 [1]

Organization

Trang 4

• Quick Overview of Mobile Devices

iOS/Android Threats and Attacks

• iOS/Android Security

Trang 5

iOS/Android Malware

• iOS malware: very little

• Juniper Networks: Major increase in Android malware from 2010 to 2011 [18]

• Android malware growth keeps increasing ($$$)

Trang 6

iOS Malware

• Malware, “fake apps” have hit iOS too

– iKee, first iPhone virus, “rickrolled” jailbroken

iDevices [25]

– Example “fake/similar” apps:

• Temple Run: Temple Climb, Temple Rush, Cave Run

• Angry Birds: Angry Zombie Birds, Shoot Angry Birds

• Not to mention “walkthroughs,” “reference” apps, etc

• Google Play banned such apps…

– iOS, Android hit with “Find and Call” app

• SMS spammed contacts from central server

• Removed from App Store, Google Play

Trang 7

Android: DroidDream Malware

• Infected 58 apps on Android

Market, March 2011

• 260,000 downloads in 4 days

• How it worked:

– Rooted phone via Android

Debug Bridge ( adb)

vulnerability

– Sent premium-rate SMS

messages at night ($$$)

• Google removed apps 4 days

after release, banned 3

developers from Market

• More malware found since

Trang 8

Android: Fake Angry Birds Space

Trang 9

• Logger stored/forwarded all received SMS messages

– Only needed SEND_SMS, RECEIVE_SMS, READ_SMS permissions

– Can send 100 SMS messages/hour

– One group put SMS logger on Google Play (removed it)

Trang 10

Android: Google Wallet

• Some credit card info

stored securely in secure

element

– Separate chip, SD card,

SIM card

• Unfortunately, other data

are not stored as securely

Trang 11

Android: Google Wallet

• NFC alone does not guarantee security

– Radio eavesdropping, data modification possible [22] – Relay attacks, spoofing possible with libnfc [23]

Trang 12

Android: Sophisticated NFC Hack

• Charlie Miller’s Black Hat 2012 presentation: Nokia, Android phones can be hijacked via NFC [24]

– NFC/Android Beam on by default on Android 2.3+,

Trang 13

• Quick Overview of Mobile Devices

• iOS/Android Threats and Attacks

iOS/Android Security

Trang 14

iOS System Architecture (1)

– Root of trust: burnt into

boot ROM at the factory

– Each component’s

signature is verified

– If any signature doesn’t

match, the “connect to

iTunes” screen is shown

Icons from Double-J Design, IconBlock

Trang 15

iOS System Architecture (2)

• Software updates

– Cannot install older version of iOS on an iDevice; e.g.,

if device runs iOS 5.1.1, cannot install iOS 4

– Device cryptographically “measures” components,

sends to Apple install server with nonce, device ID

• Nonce: value used only once

• Prevents attacker from “replaying” the value

– Server checks measurements; if allowed, server adds device ID to measurements, signs everything

Trang 16

iOS Apps and App Store

• All iOS apps signed by Apple (not developer)

• Third-party apps signed only after:

– Developer ID verification (individual, company)

– Review: bugs, work correctly (program analysis)

• Each app sandboxed in its own directory

– Cannot communicate with other apps

– Apps need signed “entitlements” to access user data

• Further app protection:

– Address Space Layout Randomization (ASLR) for all apps– ARM eXecute Never (XN) bit set for all memory pages

Trang 17

iOS Data Protection Measures

• Each iDevice has hardware-accelerated crypto

operations (AES-256)

• Effaceable Storage: securely removes crypto keys from flash memory

– “Erase all content and settings” wipes user data using

Effaceable Storage (locally or remotely)

– Interact with mobile device management (MDM),

Exchange ActiveSync servers

– Developers can use APIs for secure file, database storage

• Passcodes

– Admins can require numeric, alphanumeric, etc

– Wipe device after 10 failed login attempts

Trang 18

iPhone Configuration Utility

Trang 19

Miscellaneous iOS Security

• Built-in support for

• Apps can access contacts

without permission (fixed

in iOS 6)

Source: [8]

Trang 20

iOS Jailbreaking

• Circumvents Apple’s iOS

security mechanisms

– Violates iDevice’s terms of use

– Allows installation of apps

from alternative app stores,

e.g., Cydia

– Removes app sandbox

– Usually replaces kernel with

one accepting non-Apple

signatures

– Tools: redsn0w, Absinthe, etc.

• Legal in U.S under DMCA

2010 exemption

Trang 21

Google Android Platform

– Includes T-Mobile, Sprint

Nextel, Google, Intel,

Samsung, etc [29]

– Free, open mobile handset

platform for industry [30]

• Flagship: Google Nexus 4

Trang 22

Android Architecture

Trang 23

Android Features and Software

• Features

– 3D: OpenGL ES 1.0

– SQLite: Database engine

– WebKit: Web browser

Trang 24

Android Security (1)

• Android built on Linux kernel, which provides

– User permissions model

– Process isolation

• Each app is assigned unique user/group IDs, run

as a separate process app sandbox ⇒

• System partition mounted read-only

• Android 3.0+ enables filesystem encryption using Linux dmcrypt (AES-128)

• Device admins can require passwords with

specific criteria, remote wipe devices, etc.

Trang 25

Android Security (2)

• Android device

administration (3.0+):

– Remote wipe

– Require strong password

– Full device encryption

– Disable camera

Trang 26

Android Security (3)

• Other protection mechanisms:

– Android 1.5+: stack buffer, integer overflow protection; double free, chunk consolidation attack prevention

– Android 2.3+: format string protection, NX, null pointer dereference mitigation

– Android 4.0+: ASLR implemented

– Android 4.1+: ASLR strengthened, plug kernel leaks

• Capability-based permissions mechanism:

– Many APIs are not invoked without permission, e.g.,

camera, GPS, wireless, etc

– Every app must declare the permissions it needs

– Users need to allow these permissions when installing app

Trang 27

Android Security (4)

• All Android apps need

to be signed: by the

developer, not Google

• Google Play app store

less regulated

– Apps available rapidly

after publishing

– Bouncer service scans

for malware in store [11]

Google Play permissions interface

Trang 28

Android Device Diversity (1)

• Android runs on various

devices

– Different devices run

different OS versions

– Device manufacturers often

add their own custom UIs,

software

– Mobile operators add their

own software

– Not all devices are updated

to latest Android version!

• Security challenges…

Android devices accessing Google Play, August 2012 Some devices are not always updated to the latest version These devices tend to have security vulnerabilities targeted

by attackers.

Source: [12]

Trang 29

Android Device Diversity (2)

• Notice many Android

devices are “orphaned”

without major updates

[13]

• Android developers

need to secure their

apps for many different

devices…

Trang 30

Android Device Diversity (3)

The OpenSignalMaps Android app sees almost 4,000 types of device clients Source: [14]

Trang 31

Rooting Android Devices

• Android device owners can often get root access to

their devices

– Process can be as simple as unlocking bootloader

– Sometimes, exploit bugs to get root

– Result: install OS of choice, bypass device/operator

restrictions

– Legal under 2010 DMCA exemption

• Security problems:

– Voids device warranty (usually)

– Circumvents app sandbox: root can modify any app’s files– Malware can root and own your device!

Trang 32

References (1)

14 Feb 2012,

http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c1 1-520862.html

http://www.samsung.com/global/business/semiconductor/product/application/detail?productId=76 68&iaId=2341

http://blog.nielsen.com/nielsenwire/online_mobile/two-thirds-of-new-mobile-buyers-now-opting-f or-smartphones/

2012,

http://www.insidemobileapps.com/2012/07/24/ios-device-sales-leapfrog-android-with-410-million-d evices-sold/

http://www.macworld.co.uk/ipod-itunes/news/index.cfm?newsid=16927

http://developer.apple.com/iphone/program/university.html

http://source.android.com/tech/security/index.html

Presentation organization inspired by T Eston, “Android vs iOS Security Showdown,” 2012,

Trang 33

12 Android Open Source Project, http://developer.android.com/about/dashboards/index.html

13 M DeGusta, “Android Orphans: Visualizing a Sad History of Support,” 26 Oct 2011,

of-support

18 Juniper Networks, Inc., “Global Research Shows Mobile Malware Accelerating,” 15 Feb

2012,

http://newsroom.juniper.net/press-releases/global-research-shows-mobile-malware-accelera ting-nyse-jnpr-0851976

Trang 35

References (4)

30 A J Aviv, K Gibson, E Mossop, M Blaze, and A M Smith, “Smudge Attacks on

Smartphone Touch Screens,” Proc USENIX WOOT, 2010.

31 X Ni, Z Yang, X Bai, A C Champion, and Dong Xuan, “DiffUser: Differentiated User

Access Control on Smartphones,” Proc IEEE Int’l Workshop on Wireless and Sensor

Networks Security (WSNS), 2009.

32 W Enck, P Gilbert, B.-G Chun, L P Cox, J Jung, P McDaniel, and A N Sheth,

“TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” Proc USENIX OSDI, 2010, http://appanalysis.org

33 W Enck, P Gilbert, B.-G Chun, L P Cox, J Jung, P McDaniel, and A N Sheth,

“TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones,” http://static.usenix.org/event/osdi10/tech/slides/enck.pdf

34 B Gu, X Li, G Li, A C Champion, Z Chen, F Qin, and D Xuan, “D2Taint:

Differentiated and Dynamic Information Flow Tracking on Smartphones for Numerous Data Sources,” Technical Report, 2012.

Ngày đăng: 10/10/2015, 16:51

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
1. Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016”, 14 Feb. 2012,http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html Sách, tạp chí
Tiêu đề: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016
2. Samsung, “Exynos 5 Dual,” 2012, http://www.samsung.com/global/business/semiconductor/product/application/detail?productId=7668&iaId=2341 Sách, tạp chí
Tiêu đề: Exynos 5 Dual
Tác giả: Samsung
Năm: 2012
3. Nielsen Co., “Two Thirds of All New Mobile Buyers Now Opting for Smartphones,” 12 Jul. 2012, http://blog.nielsen.com/nielsenwire/online_mobile/two-thirds-of-new-mobile-buyers-now-opting-for-smartphones/ Sách, tạp chí
Tiêu đề: Two Thirds of All New Mobile Buyers Now Opting for Smartphones
Tác giả: Nielsen Co
Năm: 2012
4. K. De Vere, “iOS leapfrogs Android with 410 million devices sold and 650,000 apps,” 24 Jul. 2012,http://www.insidemobileapps.com/2012/07/24/ios-device-sales-leapfrog-android-with-410-million-devices-sold/ Sách, tạp chí
Tiêu đề: iOS leapfrogs Android with 410 million devices sold and 650,000 apps
5. K. Haslem, “Macworld Expo: Optimised OS X sits on ‘versatile’ Flash,” 12 Jan. 2007, Macworld, http://www.macworld.co.uk/ipod-itunes/news/index.cfm?newsid=16927 Sách, tạp chí
Tiêu đề: Macworld Expo: Optimised OS X sits on ‘versatile’ Flash
Tác giả: K. Haslem
Nhà XB: Macworld
Năm: 2007
6. Wikipedia, “iOS,” updated 2012, http://en.wikipedia.org/wiki/iOS7.Apple Inc., “iPhone Developer University Program,”http://developer.apple.com/iphone/program/university.html Sách, tạp chí
Tiêu đề: iOS
Tác giả: Wikipedia
Nhà XB: Wikipedia
Năm: 2012
8. Apple Inc, “iOS Security,” http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf9.Android Open Source Project, “Android Security Overview,”http://source.android.com/tech/security/index.htmlPresentation organization inspired by T. Eston, “Android vs. iOS Security Showdown,” 2012, http://www.slideshare.net/agent0x0/the-android-vs-apple-ios-security-showdown Sách, tạp chí
Tiêu đề: iOS Security
Tác giả: Apple Inc
11. H. Lockheimer, “Android and Security,” 2 Feb. 2012, http://googlemobile.blogspot.com/2012/02/android-and-security.html Sách, tạp chí
Tiêu đề: Android and Security
Tác giả: H. Lockheimer
Nhà XB: Google Mobile Blog
Năm: 2012
12. Android Open Source Project, http://developer.android.com/about/dashboards/index.html13.M. DeGusta, “Android Orphans: Visualizing a Sad History of Support,” 26 Oct. 2011,http://theunderstatement.com/post/11982112928/android-orphans-visualizing-a-sad-history-of-support Sách, tạp chí
Tiêu đề: Android Orphans: Visualizing a Sad History of Support
Tác giả: M. DeGusta
Năm: 2011

TỪ KHÓA LIÊN QUAN